Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Veracrypt boot mode SHA512
Post: RE: Veracrypt boot mode SHA512
Snoopy Wrote: (01-10-2024, 09:52 PM)
--
TLDR;
okay got it
mode 29421 up to 29423 are capable of cracking
you need to extract the data from the physical disk, not the partition and then extract the... |
|
LK4RMA |
hashcat
|
7 |
10,705 |
01-17-2024, 05:12 PM |
|
|
Thread: Veracrypt boot mode SHA512
Post: RE: Veracrypt boot mode SHA512
I confirm that for Boot Mode the hashmode 29421 don't seem to work.
13721 on the binary don't work either.
I used Veracrypt (version 1.25.7), default PIM, default setup (AES, SHA512, boot-mode)
E... |
|
LK4RMA |
hashcat
|
7 |
10,705 |
01-10-2024, 03:46 PM |
|
|
Thread: Veracrypt boot mode SHA512
Post: RE: Veracrypt boot mode SHA512
b8vr Wrote: (12-14-2023, 01:25 AM)
--
LK4RMA Wrote: (12-12-2023, 04:00 PM)
--
Hello all,
Recent version of Veracrypt use by default AES256, XTS with SHA512 (even on boot-mode).
I have run seve... |
|
LK4RMA |
hashcat
|
7 |
10,705 |
01-09-2024, 06:10 PM |
|
|
Thread: Veracrypt boot mode SHA512
Post: Veracrypt boot mode SHA512
Hello all,
Recent version of Veracrypt use by default AES256, XTS with SHA512 (even on boot-mode).
I have run several tests and I'm unable to bruteforce Veracrypt boot volume disk with the defau... |
|
LK4RMA |
hashcat
|
7 |
10,705 |
12-12-2023, 04:00 PM |